Apple & Google announced that additional security procedures are in place to make it more difficult for law enforcement to retrieve data off a smartphone.
No one has been able to put Apple down – will hackers finally accomplish what no tech giant can? How would you feel if it had been a Google Drive attack?
The whole world gives Android the cold shoulder when speaking of privacy and security, but is Apple any better? Not really!
If you just recently converted from iPhone to Android, you’d not only want to transfer contacts from your iPhone to your Android phone or to transfer music from iTunes to Android. Both... are doable, of course. Like most of us busy bees who rely much on our calendar or planner apps, you’d most likely also want to move your iPhone calendar entries to your new and better phone (i.e...
Motorola has updated its MotoMaker.com website with a tool that migrates iPhone’s iCloud contacts and calendar data to the Moto X.
Let me begin by saying welcome to the family. You have your first Android device! I don’t know what you had before this, but since this is your first Android, we’ll cover a few things to get you started. It may seem a little daunting, this awesome new operating system, but once you get the hang of it, you’ll never want another.
It’s not every day that you’re going to hear a Samsung exec talking about how he uses an iPhone, iPad and Mac at home, and how he prefers Apple’s ecosystem’s to Samsung’s device centric policy. Let alone the company’s president and chief strategy office Young Sohn.
Earlier this year, among the plethora of pre-release Galaxy S3-related rumors we’ve seen was one that mentioned the next Samsung smartphone will come pre loaded... with the company’s own cloud solution. Dubbed S Cloud, the Samsung cloud was seen as a direct response to Apple’s iCloud that became available to iOS, OS X and Windows users once iOS 5 was release...
Mat Honan learned the hard way. He was hacked, in stellar fashion, by some social engineering techniques Kevin Mitnick would probably be proud of. He, like so many other victims of identity theft, had his bubble of information access popped and his life erased. He also states several times in his story, that “daisychaining accounts” was at the core of his undoing. Connectivity, it seems, has a price.
It’s not everyday that a technology journalist’s email and social networking accounts are hacked. After all, we would expect these folks to be more technologically savvy than the... rest of us mortals. But even with secure passwords, hackers can still find ingenious ways of running social engineering attacks. And it can sometimes involve your favorite service provider’s cus...